About your Search

20121101
20121130
Search Results 0 to 5 of about 6
an exercise and you were dealing with a scenario, if you would have the dhs, you would have the fbi, you would have the nsa, the three key players where domestic incidents are concerned. so, as we move forward, and i hope this program continues just a suggestion for future years we have to do more. we have to do more. we have gone for about 5 miles an hour to 85 miles an hour at the dhs in the last three or so years. we need to be at 120 miles per hour. and i would say that across the federal government. so this is an issue that we are suddenly engaged in and the president is heavily engaged and he's demonstrated that by putting money into cyber at dhs. we have increased our work force about 600% over the last few years. he's consistently asked for double-digit increases in the cyber budget, and even this year we don't have a budget yet but if there were a budget, we would have a significant increase evin above fy 12 where we had a significant increase over fy 11. so the president is putting resources where the need is the greatest. we need to work with the private sector, and this is an inter
. >> next a look at the fbi and its role in investigating cyber related crimes. from this morning's "washington journal" this is about 45 minutes. >> this week's segment involving your money will look at the fbi's role in fighting cyber crimes. and we are talking about-based terrorism, espionage. computer intrusions, major cyber fraud. will learn a little bit, then we will get to your calls and will learn a little bit first from shawn henry, who was the fbi's executive director for criminal and cyber programs. and been in a peer for quite a number of years by thank you for joining us. >> thanks are having. spent first of all what exactly is a cybercrime? >> when you talk about cyber, i think danger to any type of criminal activity that involves the use of the computer i think that's what most people talk about. when i talk about cybercrime on focusing on intrusions into computer networks. so those networks that we all use every single day come to increase efficiency and effectiveness in and our productivity. but those very same things that make those networks were effective for us
of the fbi's cyber division. he held the highest ranking position in the fbi's cyber division, and he will be playing, um, the fbi director. so we have general cartwright playing the role of national security adviser, bill lynn is the secretary of defense -- um, this is perfect because it's halloween, so it's kind of even easier to play roles. [laughter] and we have steve to bin sky head of the fbi. and on your, on your screens you'll also see when your names come up, you'll see the roles that they're playing, and on your table we also have the agenda. and dmitri is the co-founder and chief technology officer for cloud strike, he's a computer security researcher, he helps focus business and governments on how to protect their intellectual property. and dmitri is going to play the role of the ceo of the oil company that gets hit in this exercise. dmitri is on the final end. and we have james lewis beside him, he's a senior fellow and program director for csis, he's worked at the state department and commerce, and he's a leading global expert on cyber. in 2010 he was with the united nat
various leading government officials up there all back that up, including director of the fbi. i'm paraphrasing, but he said these two categories of companies. those that have been compromised and will be gorgeous so delicate. so that's the shocking statistics to take. it is not uncommon for a credit card company to come back to emerge it and say hey, our threat vector detection system is more sophisticated than yours. we are picking up some indications he been compromised. here's what you need to look at. some recent examples of some very high profile and public incidents that have occurred recently. rsa, the cybersecurity company files was breached in 2011 and that led to a number of other breaches because their systems are used by many companies to provide this company's own security systems. in addition, there is a classic financial crimes case involving sony. i think that one of the takeaways from these examples is that these are not -- these are companies technologically sophisticated pressure in the cyberworld and they themselves were reached. so these are wal-marts for co
on the specifics of the investigation. the fbi has its own protocols in terms of how they proceed. and i'm going to let director mueller and others examine those protocols, and make some statements to the public generally. i do want to emphasize what i said before. general petraeus had an extraordinary career. deserved this country with great distinction in iraq, in afghanistan, and as head of the cia. by his own assessment, he did not meet the standards that he felt were necessary as the director of cia with respect to this personal matter that he is now dealing with, with his family, and with his wife. and it's on that basis that he tendered his resignation, and it's on that basis that i accepted it. but i want to emphasize that from my perspective at least, he has provided this country and extraordinary service. we are safer because of the work that dave petraeus has done, and my main hope right now is that he and his family are able to move on, and that this instead of being -- this into a being a single side note on what has been otherwise been an extraordinary career. [inaudible] >> you kn
more problematic. i think one of the other panelists mentioned this quote from fbi director, and you see the same concerns of talking about in the commercial sphere, to. he said basically set to every company is being hacked one way or another and it's not a question of when they will be hacked. it will be a question of when it will happen again. that might be a pessimistic view of how bitter cybersecurity sector can be. it is certainly a theme you see in the space. my only point, the only other point i want to make on commercial data is that you see and report. there was a report issued by verizon about data breach investigation, that suggests that a lease in endears large numbers of serious cyber intrusions intrusions have been aimed at create taking authentication credential, passwords, usernames, things like that. things that can be used for later inclusion's in the future, things that might give an intruder broader access to a network. so i'd like to shift for a moment, those ideas in mind, and talk about offense of cyber operations. and what do we mean by that and what is, what
Search Results 0 to 5 of about 6

Terms of Use (10 Mar 2001)